
Summary
The detection rule examines the use of the Windows Update Client binary (wuauclt.exe) to identify any potentially malicious network connections initiated through the command line. Wuauclt.exe is typically legitimate software used by Windows for updating the system, but it can be exploited to execute arbitrary code or facilitate network connections that may indicate suspicious behavior. The rule focuses on specific command line patterns that suggest the binary is being used to proxy connections. To be effective, the rule requires enrichments to the CommandLine field for complete analysis. It employs several filters to exclude known internal IP addresses and common Windows paths that may generate false positives. The specified conditions must accurately capture instances of wuauclt.exe execution that deviate from normal usage, particularly those that involve direct network activity without the expected parameters. If the binary is detected in conjunction with the problematic command line arguments and does not match any of the exclusions, it triggers an alert for potential investigation.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Network Traffic
Created: 2020-10-12